Some versions of the content management system present a critical vulnerability that leaves them exposed to remote code execution attacks Network security...
In a blog post, Cybereason’s Nocturnus Research Team has uncovered a new strain of Astaroth Trojan which infects systems by exploiting processes...
A 43-year-old software manager of a Chinese bank managed to withdraw over 7 million yuan (more than $1 million) from ATMs of the same...
A new trojan dubbed SpeakUp exploiting six different Linux distributions with know vulnerabilities. The campaign primarily targeting East Asia and Latin America,...
Cybercriminals now actively exploiting 9,852 Cisco RV320/RV325 routers that are vulnerable to critical remote code execution vulnerabilities CVE-2019-1653, CVE-2019-1652. A vulnerability in the...
A security consultancy firm going by the name Bishop Fox informed Google of a UPnP bug in 2014 that has affected Chromecast...
MassExploitConsole is a python based easy-to-use cli tool for executing exploits. It has a collection of exploits to execute, built-in scanner for...
APT group widely exploiting the new Adobe flash 0day vulnerability via MS word document and the vulnerability allows attackers to execute the...
According to a report from Recorded Future, it seems the ruling elite in North Korea are now using the Internet more and...
Security experts for a long time have warned users to turn-off UPnP (Universal Plug and Play) on their home modem/routers, to close...
The VPNFilter malware is a globally deployed threat infected thousands of network devices across the globe, it is a multi-stage, modular platform...
A research report published by F-Secure has unearthed a new flaw that makes most of the devices including those that are equipped...
A Monero mining script is spreading using remote command execution vulnerability It seemed a matter of time before attacks like these happened...
Malicious Hackers created a malware with an exploit for an unpatched Microsoft Zero-day flaw that was revealed a few days before by...
Routersploit is an open source framework used for exploiting vulnerabilities in embedded devices like routers. Routersploit is loaded with various modules that...
Exploiting vulnerable/misconfigured Firebase databases Prerequisites Non-standard python modules: dnsdumpster bs4 requests Installation If the following commands run successfully, you are ready to...
Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit For faster pen testing for large networks What You Can Do...
Are hackers smarter and more creative than cyber guardians? This is becoming the eternal question of the digital age. While we would...
Z-Wave uses a shared network key to secure traffic. This key is exchanged between the controller and the client devices (‘nodes’) when...
Turla cyber espionage group leveraging Powerful Mosquito backdoor using open source exploitation framework Metasploit for an initial stage of the attack on the target...
Last week, we reported first Rowhammer attack on the remote network, called Throwhammer, which involves using a known DRAM vulnerability via network...